Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Diagnostic imaging (4)
- Machine learning (3)
- Computer vision (2)
- Daniel Felix Ritchie School of Engineering and Computer Science (2)
- ETD (2)
-
- Prostate--Cancer--Diagnosis (2)
- Algorithms--Data processing (1)
- Attributes based network (1)
- Authorship identification (1)
- Authorship--Data processing (1)
- Autism--Diagnosis (1)
- Automatic speech recognition (1)
- BLN-Gram-TF-ITF (1)
- Behavioral drift (1)
- Biometrics (1)
- CUDA (1)
- Cardiac resuscitation--Study and teaching--Simulation methods (1)
- Chat bots (1)
- Classification (1)
- Cloud Firewalls (1)
- Cloud Networks (1)
- Cloud Robotics (1)
- Cloud Security (1)
- Cloud computing (1)
- Cognitive radio networks (1)
- Complex network generator (1)
- Computer crimes--Investigation (1)
- Computer networks--Security measures (1)
- Computer security (1)
- Computer vision system (1)
Articles 1 - 22 of 22
Full-Text Articles in Engineering
Identification, Indexing, And Retrieval Of Cardio-Pulmonary Resuscitation (Cpr) Video Scenes Of Simulated Medical Crisis., Surangkana Rawungyot
Identification, Indexing, And Retrieval Of Cardio-Pulmonary Resuscitation (Cpr) Video Scenes Of Simulated Medical Crisis., Surangkana Rawungyot
Electronic Theses and Dissertations
Medical simulations, where uncommon clinical situations can be replicated, have proved to provide a more comprehensive training. Simulations involve the use of patient simulators, which are lifelike mannequins. After each session, the physician must manually review and annotate the recordings and then debrief the trainees. This process can be tedious and retrieval of specific video segments should be automated. In this dissertation, we propose a machine learning based approach to detect and classify scenes that involve rhythmic activities such as Cardio-Pulmonary Resuscitation (CPR) from training video sessions simulating medical crises. This applications requires different preprocessing techniques from other video applications. …
Ensemble Learning Method For Hidden Markov Models., Anis Hamdi
Ensemble Learning Method For Hidden Markov Models., Anis Hamdi
Electronic Theses and Dissertations
For complex classification systems, data are gathered from various sources and potentially have different representations. Thus, data may have large intra-class variations. In fact, modeling each data class with a single model might lead to poor generalization. The classification error can be more severe for temporal data where each sample is represented by a sequence of observations. Thus, there is a need for building a classification system that takes into account the variations within each class in the data. This dissertation introduces an ensemble learning method for temporal data that uses a mixture of Hidden Markov Model (HMM) classifiers. We …
A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef
A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef
Electronic Theses and Dissertations
Prostate cancer is the second most fatal cancer experienced by American males. The average American male has a 16.15% chance of developing prostate cancer, which is 8.38% higher than lung cancer, the second most likely cancer. The current in-vitro techniques that are based on analyzing a patients blood and urine have several limitations concerning their accuracy. In addition, the prostate Specific Antigen (PSA) blood-based test, has a high chance of false positive diagnosis, ranging from 28%-58%. Yet, biopsy remains the gold standard for the assessment of prostate cancer, but only as the last resort because of its invasive nature, high …
Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza
Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza
Electronic Theses and Dissertations
Bots are malicious, automated computer programs that execute malicious scripts and predefined functions on an affected computer. They pose cybersecurity threats and are one of the most sophisticated and common types of cybercrime tools today. They spread viruses, generate spam, steal personal sensitive information, rig online polls and commit other types of online crime and fraud. They sneak into unprotected systems through the Internet by seeking vulnerable entry points. They access the system’s resources like a human user does. Now the question arises how do we counter this? How do we prevent bots and on the other hand allow human …
Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti
Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti
Electronic Theses and Dissertations
The current trends in technology suggest that the next generation of services and devices allows smarter customization and automatic context recognition. Computers learn the behavior of the users and can offer them customized services depending on the context, location, and preferences. One of the most important challenges in human-machine interaction is the proper understanding of human emotions by machines and automated systems. In the recent years, the progress made in machine learning and pattern recognition led to the development of algorithms that are able to learn the detection and identification of human emotions from experience. These algorithms use different modalities …
Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina
Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina
Electronic Theses and Dissertations
As of 2014, about 2.5 quintillion bytes of data are created each day, and 90% of the data in the world was created in the last two years alone. The storage of this data can be on external hard drives, on unused space in peer-to-peer (P2P) networks or using the more currently popular approach of storing in the Cloud. When the users store their data in the Cloud, the entire data is exposed to the administrators of the services who can view and possibly misuse the data. With the growing popularity and usage of Cloud storage services like Google Drive, …
Context Dependent Spectral Unmixing., Hamdi Jenzri
Context Dependent Spectral Unmixing., Hamdi Jenzri
Electronic Theses and Dissertations
A hyperspectral unmixing algorithm that finds multiple sets of endmembers is proposed. The algorithm, called Context Dependent Spectral Unmixing (CDSU), is a local approach that adapts the unmixing to different regions of the spectral space. It is based on a novel function that combines context identification and unmixing. This joint objective function models contexts as compact clusters and uses the linear mixing model as the basis for unmixing. Several variations of the CDSU, that provide additional desirable features, are also proposed. First, the Context Dependent Spectral unmixing using the Mahalanobis Distance (CDSUM) offers the advantage of identifying non-spherical clusters in …
A Novel Nmf-Based Dwi Cad Framework For Prostate Cancer., Patrick Mcclure
A Novel Nmf-Based Dwi Cad Framework For Prostate Cancer., Patrick Mcclure
Electronic Theses and Dissertations
In this thesis, a computer aided diagnostic (CAD) framework for detecting prostate cancer in DWI data is proposed. The proposed CAD method consists of two frameworks that use nonnegative matrix factorization (NMF) to learn meaningful features from sets of high-dimensional data. The first technique, is a three dimensional (3D) level-set DWI prostate segmentation algorithm guided by a novel probabilistic speed function. This speed function is driven by the features learned by NMF from 3D appearance, shape, and spatial data. The second technique, is a probabilistic classifier that seeks to label a prostate segmented from DWI data as either alignat, contain …
A Novel Diffusion Tensor Imaging-Based Computer-Aided Diagnostic System For Early Diagnosis Of Autism., Mahmoud Mostapha
A Novel Diffusion Tensor Imaging-Based Computer-Aided Diagnostic System For Early Diagnosis Of Autism., Mahmoud Mostapha
Electronic Theses and Dissertations
Autism spectrum disorders (ASDs) denote a significant growing public health concern. Currently, one in 68 children has been diagnosed with ASDs in the United States, and most children are diagnosed after the age of four, despite the fact that ASDs can be identified as early as age two. The ultimate goal of this thesis is to develop a computer-aided diagnosis (CAD) system for the accurate and early diagnosis of ASDs using diffusion tensor imaging (DTI). This CAD system consists of three main steps. First, the brain tissues are segmented based on three image descriptors: a visual appearance model that has …
Text Stylometry For Chat Bot Identification And Intelligence Estimation., Nawaf Ali
Text Stylometry For Chat Bot Identification And Intelligence Estimation., Nawaf Ali
Electronic Theses and Dissertations
Authorship identification is a technique used to identify the author of an unclaimed document, by attempting to find traits that will match those of the original author. Authorship identification has a great potential for applications in forensics. It can also be used in identifying chat bots, a form of intelligent software created to mimic the human conversations, by their unique style. The online criminal community is utilizing chat bots as a new way to steal private information and commit fraud and identity theft. The need for identifying chat bots by their style is becoming essential to overcome the danger of …
Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit
Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit
Electronic Theses and Dissertations
Smartphones, loaded with users’ personal information, are a primary computing device for many. Advent of 4G networks, IPV6 and increased number of subscribers to these has triggered a host of application developers to develop softwares that are easy to install on the mobile devices. During the application download process, users accept the terms and conditions that permit revelation of private information. The free application markets are sustainable as the revenue model for most of these service providers is through profiling of users and pushing advertisements to the users. This creates a serious threat to users privacy and hence it is …
Image Based Approach For Early Assessment Of Heart Failure., Hisham Z. Sliman
Image Based Approach For Early Assessment Of Heart Failure., Hisham Z. Sliman
Electronic Theses and Dissertations
In diagnosing heart diseases, the estimation of cardiac performance indices requires accurate segmentation of the left ventricle (LV) wall from cine cardiac magnetic resonance (CMR) images. MR imaging is noninvasive and generates clear images; however, it is impractical to manually process the huge number of images generated to calculate the performance indices. In this dissertation, we introduce a novel, fast, robust, bi-directional coupled parametric deformable models that are capable of segmenting the LV wall borders using first- and second-order visual appearance features. These features are embedded in a new stochastic external force that preserves the topology of the LV wall …
Synthetic Generators For Simulating Social Networks, Awrad Mohammed Ali
Synthetic Generators For Simulating Social Networks, Awrad Mohammed Ali
Electronic Theses and Dissertations
An application area of increasing importance is creating agent-based simulations to model human societies. One component of developing these simulations is the ability to generate realistic human social networks. Online social networking websites, such as Facebook, Google+, and Twitter, have increased in popularity in the last decade. Despite the increase in online social networking tools and the importance of studying human behavior in these networks, collecting data directly from these networks is not always feasible due to privacy concerns. Previous work in this area has primarily been limited to 1) network generators that aim to duplicate a small subset of …
Human Detection, Tracking And Segmentation In Surveillance Video, Guang Shu
Human Detection, Tracking And Segmentation In Surveillance Video, Guang Shu
Electronic Theses and Dissertations
This dissertation addresses the problem of human detection and tracking in surveillance videos. Even though this is a well-explored topic, many challenges remain when confronted with data from real world situations. These challenges include appearance variation, illumination changes, camera motion, cluttered scenes and occlusion. In this dissertation several novel methods for improving on the current state of human detection and tracking based on learning scene-specific information in video feeds are proposed. Firstly, we propose a novel method for human detection which employs unsupervised learning and superpixel segmentation. The performance of generic human detectors is usually degraded in unconstrained video environments …
Spectrum Map And Its Application In Cognitive Radio Networks, Saptarshi Debroy
Spectrum Map And Its Application In Cognitive Radio Networks, Saptarshi Debroy
Electronic Theses and Dissertations
Recent measurements on radio spectrum usage have revealed the abundance of underutilized bands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access. Cognitive radio based secondary networks that utilize such unused spectrum holes in the licensed band, have been proposed as a possible solution to the spectrum crisis. The idea is to detect times when a particular licensed band is unused and use it for transmission without causing interference to the licensed user. We argue that prior knowledge about occupancy of such bands and the corresponding achievable performance metrics can potentially …
Taming Wild Faces: Web-Scale, Open-Universe Face Identification In Still And Video Imagery, Enrique Ortiz
Taming Wild Faces: Web-Scale, Open-Universe Face Identification In Still And Video Imagery, Enrique Ortiz
Electronic Theses and Dissertations
With the increasing pervasiveness of digital cameras, the Internet, and social networking, there is a growing need to catalog and analyze large collections of photos and videos. In this dissertation, we explore unconstrained still-image and video-based face recognition in real-world scenarios, e.g. social photo sharing and movie trailers, where people of interest are recognized and all others are ignored. In such a scenario, we must obtain high precision in recognizing the known identities, while accurately rejecting those of no interest. Recent advancements in face recognition research has seen Sparse Representation-based Classification (SRC) advance to the forefront of competing methods. However, …
Fabrication And Application Of A Polymer Neuromorphic Circuitry Based On Polymer Memristive Devices And Polymer Transistors, Robert A. Nawrocki
Fabrication And Application Of A Polymer Neuromorphic Circuitry Based On Polymer Memristive Devices And Polymer Transistors, Robert A. Nawrocki
Electronic Theses and Dissertations
Neuromorphic engineering is a discipline that aims to address the shortcomings of today's serial computers, namely large power consumption, susceptibility to physical damage, as well as the need for explicit programming, by applying biologically-inspired principles to develop neural systems with applications such as machine learning and perception, autonomous robotics and generic artificial intelligence.
This doctoral dissertation presents work performed fabricating a previously developed type of polymer neuromorphic architecture, termed Polymer Neuromorphic Circuitry (PNC), inspired by the McCulloch-Pitts model of an artificial neuron. The major contribution of this dissertation is a development of processing techniques necessary to realize the Polymer Neuromorphic …
Secure Map Generation For Multiplayer, Turn-Based Strategy Games, Stephen L. Rice
Secure Map Generation For Multiplayer, Turn-Based Strategy Games, Stephen L. Rice
Electronic Theses and Dissertations
In strategy games, players compete against each other on randomly generated maps in an attempt to prove their superior skill. Traditionally, these games rely on a client/server architecture with one player fulfilling the role of server and holding responsibility for the map generation process. We propose, analyze and evaluate a method that allows these maps to be created in a peer-to-peer fashion and thus reduce the potential for cheating. We provide an example map generation program that puts these concepts into action and demonstrate how it can be extended and customized for any game. Finally, we analyze the performance of …
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
Electronic Theses and Dissertations
The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.
Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …
Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad
Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad
Electronic Theses and Dissertations
In recent years, the advancement of neurobiologically plausible models and computer networking has resulted in new ways of implementing control systems on robotic platforms. The work presents a control approach based on vertebrate neuromodulation and its implementation on autonomous robots in the open-source, open-access environment of robot operating system (ROS). A spiking neural network (SNN) is used to model the neuromodulatory function for generating context based behavioral responses of the robots to sensory input signals. The neural network incorporates three types of neurons- cholinergic and noradrenergic (ACh/NE) neurons for attention focusing and action selection, dopaminergic (DA) neurons for rewards- and …
Human-Robot Interaction For Multi-Robot Systems, Bennie Lewis
Human-Robot Interaction For Multi-Robot Systems, Bennie Lewis
Electronic Theses and Dissertations
Designing an effective human-robot interaction paradigm is particularly important for complex tasks such as multi-robot manipulation that require the human and robot to work together in a tightly coupled fashion. Although increasing the number of robots can expand the area that the robots can cover within a bounded period of time, a poor human-robot interface will ultimately compromise the performance of the team of robots. However, introducing a human operator to the team of robots, does not automatically improve performance due to the difficulty of teleoperating mobile robots with manipulators. The human operator’s concentration is divided not only among multiple …
Sps: An Sms-Based Push Service For Energy Saving In Smartphone's Idle State, Erich Dondyk
Sps: An Sms-Based Push Service For Energy Saving In Smartphone's Idle State, Erich Dondyk
Electronic Theses and Dissertations
Despite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in the smartphone, the cellular data and Wi-Fi interfaces often continue to be used even while the phone is in the idle state to accommodate unnecessary data traffic produced by some applications. In addition, bad reception has been proven to greatly increase energy consumed by the radio, which happens quite often when smartphone users are inside buildings. In this paper, we present a Short message service Push based Service (SPS) to save unnecessary power consumption when …